background preloader

Systems - Virtualization, Networking and Cloud. Virtual Computing, Simplified.

Systems - Virtualization, Networking and Cloud. Virtual Computing, Simplified.

Navfree Latest Satellite Navigation Software for iPhone, iPad and Android Offline Maps - Better than Online Maps Nearly all mobile devices are constantly connected to the Internet. 3G, Wifi, LTE and 4G have become standards for smartphones. This is great for many applications such as email and web browsing, but for navigation a purely online map can cause problems. Roaming Cost – Online map applications require a constant data connection to download map data, this data is quite large and can quickly generate large phone bills when you are roaming in another country. Navmii and Navfree apps are different, they store all the map data on-board the phone itself, meaning you don’t need to use your Internet connection to navigate saving you money when you are traveling.

Q and A on Implementing XenApp and XenDesktop 7.5 Hi all, I recently delivered several webinars on implementing XenApp and XenDesktop 7.5. If you were unable to attend, the webinars have been recorded and posted to CitrixTV: Jump Start your XenApp 7.5 Deployment - Creating Minimal Pixel Art with Photoshop (Part 3) Hi! Welcome to Part 3 of my Minimal Pixel Art tutorial. This is the last one of this series & should be fun. Secure Passwords Often, there is really only one thing standing between your sensitive information and criminals - your password. If they get it, they can get into banks accounts and private files, and wreak havoc. For this reason, it's important to know what makes a password strong and secure. Chances are, you use passwords everyday. To open your computer, to log into your favorite websites, to get work done.

Q. What's the difference between thick-provisioned and thin-provisioned disks in ESX 4.0? A. Versions of ESX prior to 4.0 were only capable of creating thick-provisioned disks. Disks in this format are created with the entire size of the disk pre-allocated on physical storage at the time the disk is created. This pre-allocation means that creating a 100GB virtual disk actually consumes 100GB of physical disk space on your drives. Common Password Mistakes and How to Create Stronger Passwords « Flower Blossoms' Blog A password is a secret word or string of characters that is used for authentication to prove identity or gain access to resources. We encounter passwords in our daily lives, at the ATM, when logging onto our home or office computers, or logging into our table TV decoder when purchasing a pay-per-view event. We use passwords several times per day when we are using our computers, such as retrieving e-mail from servers; accessing programs; databases; social networking websites; or even reading the morning newspaper online. Computer passwords are our first, last, and best line of defense against damaging intrusions. Companies rely on passwords to protect sensitive information from hackers. The use of poorly designed passwords could leave us vulnerable to: identity theft, financial loss, invasion of privacy, exposure of proprietary company data, and sharing sensitive or embarrassing information.

SQL database location, in the Citrix XenApp / Presentation Server forum on Dan Murray replied on Mon, Dec 7 2009 2:42 PM Yes, you can move the database (once you find out where it is). There is no need to rebuild. I've moved our database two or three times over the last three years and it's never been a problem. As for finding it, try running the following VBS script on one of your farm servers: Hacking Into Your Account is as Easy as 123456 The big Hollywood pictures always make breaking into computers look like a fabulously hip and complicated process. It involves excitement and ingenuity and often times, because it's just so difficult and exciting, a bit of sweat on the brow. But in reality, it's as easy as "123456". And if that doesn't work, we'd suggest trying "12345", next. A report released today looks at a list of 32 million passwords and what it finds doesn't say good things about most of us and our password practices.

Assigning vDisks to Target Devices A vDisk can be assigned to a single target device or to all devices within a target device collection. If a target device has more than one vDisk assigned to it, a list of vdisks displays at boot time allowing the user to select the appropriate vDisk to boot. If one or more versions exist for a vDisk, the version target devices use in Production is either the highest numbered production version or an override version. For details refer to 'Accessing a vDisk Version' in the Administrator's Guide.